{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:40:03Z","timestamp":1771332003072,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U19B2021"],"award-info":[{"award-number":["U19B2021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U19B2021"],"award-info":[{"award-number":["U19B2021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U19B2021"],"award-info":[{"award-number":["U19B2021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"The Youth Innovation Team of Shaanxi Universities"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12083-024-01743-6","type":"journal-article","created":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T09:01:42Z","timestamp":1718442102000},"page":"3094-3109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine"],"prefix":"10.1007","volume":"17","author":[{"given":"Runze","family":"Wu","sequence":"first","affiliation":[]},{"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,15]]},"reference":[{"issue":"1","key":"1743_CR1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1038\/s41746-017-0013-1","volume":"1","author":"A Madani","year":"2018","unstructured":"Madani A, Arnaout R, Mofrad MRK, Arnaout R (2018) Fast and accurate view classification of echocardiograms using deep learning. npj Digit Medicine 1(1):6","journal-title":"npj Digit Medicine"},{"issue":"4","key":"1743_CR2","doi-asserted-by":"crossref","first-page":"1114","DOI":"10.1109\/TITB.2009.2039485","volume":"14","author":"NH Barakat","year":"2010","unstructured":"Barakat NH, Bradley AP, Barakat MNH (2010) Intelligible support vector machines for diagnosis of diabetes mellitus. IEEE Trans Inf Technol Biomed 14(4):1114\u20131120","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"1743_CR3","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2020","unstructured":"Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: secure and verifiable federated learning. IEEE Trans Inf Forensics Secur 15:911\u2013926","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1743_CR4","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2034691.2034742","volume-title":"ACM Symposium on Document Engineering","author":"TA Almeida","year":"2011","unstructured":"Almeida TA, Hidalgo JMG, Yamakami A (2011) Contributions to the study of SMS spam filtering: new collection and results. ACM Symposium on Document Engineering. ACM, New York, pp 259\u2013262"},{"key":"1743_CR5","first-page":"815","volume-title":"CVPR","author":"F Schroff","year":"2015","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) FaceNet: a unified embedding for face recognition and clustering. CVPR. IEEE Computer Society, CA, pp 815\u2013823"},{"key":"1743_CR6","volume-title":"A practical guide to support vector classification","author":"C-W Hsu","year":"2003","unstructured":"Hsu C-W, Chang C-C, Lin C-J (2003) A practical guide to support vector classification. Department of Computer Science, National Taiwan University, Taipei, Taiwan"},{"issue":"5","key":"1743_CR7","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1109\/TDSC.2013.51","volume":"11","author":"Y Rahulamathavan","year":"2014","unstructured":"Rahulamathavan Y, Phan RC-W, Veluru S, Cumanan K, Rajarajan M (2014) Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans Dependable Secur Comput 11(5):467\u2013479","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1743_CR8","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"EUROCRYPT","author":"P Paillier","year":"1999","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. EUROCRYPT, vol 1592. Lecture Notes in Computer Science. Springer, Heidelberg, pp 223\u2013238"},{"key":"1743_CR9","first-page":"160","volume-title":"FOCS","author":"AC Yao","year":"1982","unstructured":"Yao AC (1982) Protocols for secure computations. FOCS. IEEE Computer Society, CA, pp 160\u2013164"},{"key":"1743_CR10","series-title":"Lecture Notes in Computer Science","first-page":"420","volume-title":"CRYPTO","author":"D Beaver","year":"1991","unstructured":"Beaver D (1991) Efficient multiparty protocols using circuit randomization. CRYPTO, vol 576. Lecture Notes in Computer Science. Springer, Heidelberg, pp 420\u2013432"},{"issue":"1","key":"1743_CR11","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/JBHI.2013.2274899","volume":"18","author":"Y Rahulamathavan","year":"2014","unstructured":"Rahulamathavan Y, Veluru S, Phan RC, Chambers JA, Rajarajan M (2014) Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE J Biomed Health Informatics 18(1):56\u201366","journal-title":"IEEE J Biomed Health Informatics"},{"issue":"6","key":"1743_CR12","doi-asserted-by":"crossref","first-page":"4113","DOI":"10.1109\/TDSC.2021.3119897","volume":"19","author":"B Xie","year":"2022","unstructured":"Xie B, Xiang T, Liao X, Wu J (2022) Achieving privacy-preserving online diagnosis with outsourced SVM in internet of medical things environment. IEEE Trans Dependable Secur Comput 19(6):4113\u20134126","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"2","key":"1743_CR13","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/TDSC.2017.2679189","volume":"16","author":"M De Cock","year":"2019","unstructured":"De Cock M, Dowsley R, Horst C, Katti R, Nascimento AC, Poon W-S, Truex S (2019) Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE Trans Dependable Secur Comput 16(2):217\u2013230","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1743_CR14","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/TIFS.2019.2946476","volume":"17","author":"Y Liu","year":"2022","unstructured":"Liu Y, Ma Z, Liu X, Ma S, Ren K (2022) Privacy-preserving object detection for medical images with faster r-CNN. IEEE Trans Inf Forensics Secur 17:69\u201384","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1743_CR15","first-page":"619","volume-title":"CCS","author":"J Liu","year":"2017","unstructured":"Liu J, Juuti M, Lu Y, Asokan N (2017) Oblivious neural network predictions via Minionn transformations. CCS. ACM, New York, pp 619\u2013631"},{"key":"1743_CR16","volume-title":"NDSS","author":"D Demmler","year":"2015","unstructured":"Demmler D, Schneider T, Zohner M (2015) ABY - a framework for efficient mixed-protocol secure two-party computation. NDSS. The Internet Society, CA"},{"key":"1743_CR17","first-page":"805","volume-title":"CCS","author":"T Araki","year":"2016","unstructured":"Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. CCS. ACM, New York, pp 805\u2013817"},{"key":"1743_CR18","first-page":"19","volume-title":"IEEE Symposium on Security and Privacy","author":"P Mohassel","year":"2017","unstructured":"Mohassel P, Zhang Y (2017) SecureML: a system for scalable privacy-preserving machine learning. IEEE Symposium on Security and Privacy. IEEE Computer Society, CA, pp 19\u201338"},{"key":"1743_CR19","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1145\/3196494.3196522","volume-title":"AsiaCCS","author":"MS Riazi","year":"2018","unstructured":"Riazi MS, Weinert C, Tkachenko O, Songhori EM, Schneider T, Koushanfar F (2018) Chameleon: a hybrid secure computation framework for machine learning applications. AsiaCCS. ACM, New York, pp 707\u2013721"},{"key":"1743_CR20","first-page":"1102","volume-title":"IEEE Symposium on Security and Privacy","author":"I Damg\u00e5rd","year":"2019","unstructured":"Damg\u00e5rd I, Escudero D, Frederiksen TK, Keller M, Scholl P, Volgushev N (2019) New primitives for actively-secure MPC over rings with applications to private machine learning. IEEE Symposium on Security and Privacy. IEEE, CA, pp 1102\u20131120"},{"key":"1743_CR21","first-page":"136","volume-title":"FOCS","author":"R Canetti","year":"2001","unstructured":"Canetti R (2001) Universally composable security: a new paradigm for cryptographic protocols. FOCS. IEEE Computer Society, CA, pp 136\u2013145"},{"key":"1743_CR22","unstructured":"Rabin MO (2005) How to exchange secrets with oblivious transfer. Cryptology ePrint Archive, Paper 2005\/187. https:\/\/eprint.iacr.org\/2005\/187"},{"key":"1743_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-540-45146-4_9","volume-title":"CRYPTO","author":"Y Ishai","year":"2003","unstructured":"Ishai Y, Kilian J, Nissim K, Petrank E (2003) Extending oblivious transfers efficiently. CRYPTO, vol 2729. Lecture Notes in Computer Science. Springer, Heidelberg, pp 145\u2013161"},{"key":"1743_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/978-3-642-40084-1_4","volume-title":"CRYPTO","author":"V Kolesnikov","year":"2013","unstructured":"Kolesnikov V, Kumaresan R (2013) Improved OT extension for transferring short secrets. CRYPTO, vol 8043. Lecture Notes in Computer Science. Springer, Heidelberg, pp 54\u201370"},{"key":"1743_CR25","first-page":"535","volume-title":"CCS","author":"G Asharov","year":"2013","unstructured":"Asharov G, Lindell Y, Schneider T, Zohner M (2013) More efficient oblivious transfer and extensions for faster secure computation. CCS. ACM, New York, pp 535\u2013548"},{"key":"1743_CR26","first-page":"325","volume-title":"CCS","author":"D Rathee","year":"2020","unstructured":"Rathee D, Rathee M, Kumar N, Chandran N, Gupta D, Rastogi A, Sharma R (2020) Cryptflow2: practical 2-party secure inference. CCS. ACM, New York, pp 325\u2013342"},{"key":"1743_CR27","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TIFS.2022.3144007","volume":"17","author":"ACD Resende","year":"2022","unstructured":"Resende ACD, Railsback D, Dowsley R, Nascimento ACA, Aranha DF (2022) Fast privacy-preserving text classification based on secure multiparty computation. IEEE Trans Inf Forensics Secur 17:428\u2013442","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1743_CR28","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1109\/TDSC.2022.3141391","volume":"20","author":"X Liu","year":"2023","unstructured":"Liu X, Zheng Y, Yuan X, Yi X (2023) Securely outsourcing neural network inference to the cloud with lightweight techniques. IEEE Trans Dependable Secur Comput 20(1):620\u2013636","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1743_CR29","first-page":"1003","volume-title":"IEEE Symposium on Security and Privacy","author":"D Rathee","year":"2021","unstructured":"Rathee D, Rathee M, Goli RKK, Gupta D, Sharma R, Chandran N, Rastogi A (2021) SIRNN: a math library for secure RNN inference. IEEE Symposium on Security and Privacy. IEEE, CA, pp 1003\u20131020"},{"key":"1743_CR30","first-page":"809","volume-title":"USENIX Security Symposium","author":"Z Huang","year":"2022","unstructured":"Huang Z, Lu W, Hong C, Ding J (2022) Cheetah: lean and fast secure two-party deep neural network inference. USENIX Security Symposium. USENIX Association, CA, pp 809\u2013826"},{"key":"1743_CR31","unstructured":"Rathee D, Rathee M (2020) Secure and correct inference (SCI) library. https:\/\/github.com\/mpc-msri\/EzPC\/tree\/master\/SCI"},{"key":"1743_CR32","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"1743_CR33","unstructured":"Kelly M, Longjohn R, Nottingham K The UCI machine learning repository. https:\/\/archive.ics.uci.edu"},{"issue":"1","key":"1743_CR34","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/JSYST.2020.3027758","volume":"16","author":"M Zhang","year":"2022","unstructured":"Zhang M, Song W, Zhang J (2022) A secure clinical diagnosis with privacy-preserving multiclass support vector machine in clouds. IEEE Syst J 16(1):67\u201378","journal-title":"IEEE Syst J"},{"issue":"9","key":"1743_CR35","doi-asserted-by":"crossref","first-page":"5085","DOI":"10.1002\/int.22504","volume":"36","author":"R Rehouma","year":"2021","unstructured":"Rehouma R, Buchert M, Chen YP (2021) Machine learning for medical imaging-based COVID-19 detection and diagnosis. Int J Intell Syst 36(9):5085\u20135115","journal-title":"Int J Intell Syst"},{"issue":"2","key":"1743_CR36","doi-asserted-by":"crossref","first-page":"102454","DOI":"10.1016\/j.ipm.2020.102454","volume":"58","author":"Y Chai","year":"2021","unstructured":"Chai Y, Bian Y, Liu H, Li J, Xu J (2021) Glaucoma diagnosis in the Chinese context: an uncertainty information-centric Bayesian deep learning model. Inf Process Manag 58(2):102454","journal-title":"Inf Process Manag"},{"issue":"3","key":"1743_CR37","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y Lindell","year":"2002","unstructured":"Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptol 15(3):177\u2013206","journal-title":"J Cryptol"},{"key":"1743_CR38","volume-title":"NDSS","author":"R Bost","year":"2015","unstructured":"Bost R, Popa RA, Tu S, Goldwasser S (2015) Machine learning classification over encrypted data. NDSS. The Internet Society, CA"},{"issue":"1","key":"1743_CR39","doi-asserted-by":"crossref","first-page":"142","DOI":"10.3390\/s19010142","volume":"19","author":"A Alabdulkarim","year":"2019","unstructured":"Alabdulkarim A, Al-Rodhaan M, Ma T, Tian Y (2019) PPSDT: a novel privacy-preserving single decision tree algorithm for clinical decision-support systems using IoT devices. Sensors 19(1):142","journal-title":"Sensors"},{"issue":"2","key":"1743_CR40","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JBHI.2015.2407157","volume":"20","author":"X Liu","year":"2016","unstructured":"Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on na\u00efve Bayesian classification. IEEE J Biomed Health Informatics 20(2):655\u2013668","journal-title":"IEEE J Biomed Health Informatics"},{"issue":"5","key":"1743_CR41","doi-asserted-by":"crossref","first-page":"4245","DOI":"10.1109\/TDSC.2022.3208706","volume":"20","author":"C Zhang","year":"2023","unstructured":"Zhang C, Hu C, Wu T, Zhu L, Liu X (2023) Achieving efficient and privacy-preserving neural network training and prediction in cloud environments. IEEE Trans Dependable Secure Comput 20(5):4245\u20134257","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1743_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3315324","author":"C Zhang","year":"2023","unstructured":"Zhang C, Luo X, Liang J, Liu X, Zhu L, Guo S (2023) Pota: privacy-preserving online multi-task assignment with path planning. IEEE Trans Mob Comput Early Access. https:\/\/doi.org\/10.1109\/TMC.2023.3315324","journal-title":"IEEE Trans Mob Comput. Early Access"},{"issue":"3","key":"1743_CR43","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TDSC.2020.3040012","volume":"19","author":"Y Zheng","year":"2022","unstructured":"Zheng Y, Duan H, Wang C, Wang R, Nepal S (2022) Securely and efficiently outsourcing decision tree inference. IEEE Trans Dependable Secur Comput 19(3):1841\u20131855","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"3","key":"1743_CR44","doi-asserted-by":"crossref","first-page":"1592","DOI":"10.1109\/TDSC.2020.3029899","volume":"19","author":"M Li","year":"2022","unstructured":"Li M, Chow SSM, Hu S, Yan Y, Shen C, Wang Q (2022) Optimizing privacy-preserving outsourced convolutional neural network predictions. IEEE Trans Dependable Secur Comput 19(3):1592\u20131604","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1743_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3330171","author":"C Zhang","year":"2023","unstructured":"Zhang C, Zhao M, Liang J, Fan Q, Zhu L, Guo S (2023) Nano: cryptographic enforcement of readability and editability governance in blockchain database. IEEE Trans Mob Comput Early Access. https:\/\/doi.org\/10.1109\/TDSC.2023.3330171","journal-title":"IEEE Trans Mob Comput. Early Access"},{"key":"1743_CR46","first-page":"618","volume-title":"KDD","author":"S Laur","year":"2006","unstructured":"Laur S, Lipmaa H, Mielik\u00e4inen T (2006) Cryptographically private support vector machines. KDD. ACM, New York, pp 618\u2013624"},{"key":"1743_CR47","doi-asserted-by":"crossref","first-page":"3476","DOI":"10.1109\/TIFS.2023.3283104","volume":"18","author":"C Hu","year":"2023","unstructured":"Hu C, Zhang C, Lei D, Wu T, Liu X, Zhu L (2023) Achieving privacy-preserving and verifiable support vector machine training in the cloud. IEEE Trans Inf Forensics Secur 18:3476\u20133491","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1743_CR48","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/JBHI.2016.2548248","volume":"21","author":"H Zhu","year":"2017","unstructured":"Zhu H, Liu X, Lu R, Li H (2017) Efficient and privacy-preserving online medical prediagnosis framework using nonlinear SVM. IEEE J Biomed Health Informatics 21(3):838\u2013850","journal-title":"IEEE J Biomed Health Informatics"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01743-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01743-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01743-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T16:12:24Z","timestamp":1727971944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01743-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,15]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1743"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01743-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,15]]},"assertion":[{"value":"16 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors approved the final manuscript and the submission to this journal.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}